A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

Size: px
Start display at page:

Download "A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks"

Transcription

1 A Perfect QoS Routng Algorthm for Fndng the Best Path for Dynamc Networks Hazem M. El-Bakry Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT Nkos Mastoraks Dept. of Computer Scence Mltary Insttutons of Unversty Educaton (MIUE) - Hellenc Academy, Greece Abstract :- It s hghly desrable to protect data traffc from unexpected changes as well as provde effectve network utlzaton n the nternetworkng era. In ths paper the QoS management ssue that utlzng the actve network technology s dscussed. Such algorthm s based on the proposed work presented n [15]. Actve networks seem to be partcularly useful n the context of QoS support. The Actve QoS Routng (AQR) algorthm whch s based on On-demand routng s mplemented ncorporatng the product of avalable bt rate and delay for fndng the best path for dynamc networks usng the actve network test bed ANTS. It s nferred that wth background traffc, the AQR fnds alternatve paths very quckly and the delay and subsequently the jtter nvolved are reduced sgnfcantly. In ths paper the varant of AQR mplemented s demonstrated to be more useful n reducng the jtter when the overall traffc n the network s heavy and has useful applcaton n fndng effectve QoS routng n ad-hoc networks as well as defendng DDoS attacks by dentfyng the attack traffc path usng QoS regulatons. The man achevement of ths paper s the fast attack detecton algorthm. Such algorthm based on performng cross correlaton n the frequency doman between data traffc and the nput weghts of fast tme delay neural networks (FTDNNs). It s proved mathematcally and practcally that the number of computaton steps requred for the presented FTDNNs s less than that needed by conventonal tme delay neural networks (CTDNNs). Smulaton results usng MATLAB confrm the theoretcal computatons. Keywords:- Routng Algorthm, Data Protecton, Best Path, Dynamc Networks, Fast Attack Detecton, Neural Networks 1 Introducton The wdespread growth of the Internet and the development of streamng applcatons drected the Internet socety to focus on the desgn and development of archtectures and protocols that would provde the requested level of Qualty of Servce (QoS) [15-26]. QoS s an ntutve concept defned as the collectve effect of the servce performance whch determnes the degree of satsfacton of a user of the servce or a measure of how good a servce s, as presented to the user. It s expressed n user understandable language and manfests tself n a number of parameters, all of whch have ether subjectve or objectve values. The goal of AN s to support customzed protocol mechansms that can be ntroduced n a network. Dfferences n known AN approaches concern, e.g., the queston of whether remote applcatons should be able to download protocol mechansms to a node (router) or whether ths rght should be reserved to the operators of nodes, and the queston of whether the code for these mechansms should be carred as an addtonal payload by the data packets n transt or whether shppng and nstallng such code should be separated from the ssue of data transfer. Smulaton results of ths paper are compared wth the results presented n [15] and hgh mprovement n the QoS parameter jtter s apprecated when appled on actve network wth slght modfcatons n the applcaton of the proposed algorthm. In addton, the man objectve of ths paper s to mprove the speed of tme delay neural networks for fast attack detecton. The purpose s to ISSN: Issue 12, Volume 7, December 2008

2 perform the testng process n the frequency doman nstead of the tme doman. Ths approach was successfully appled for sub-mage detecton usng fast neural networks (FNNs) as proposed n [1,2,3]. Furthermore, t was used for fast face detecton [7,9], and fast rs detecton [8]. Another dea to further ncrease the speed of FNNs through mage decomposton was suggested n [7]. FNNs for detectng a certan code n one dmensonal seral stream of sequental data were descrbed n [4,5]. Compared wth conventonal neural networks, FNNs based on cross correlaton between the tested data and the nput weghts of neural networks n the frequency doman showed a sgnfcant reducton n the number of computaton steps requred for certan data detecton [1,2,3,4,5,7,8,9,11,12]. Here, we make use of the prevous theory on FNNs mplemented n the frequency doman to ncrease the speed of tme delay neural networks for fast attack detecton. 2 QoS Routng Actve Networks (AN) s a framework where network elements, essentally routers and swtches are programmable. Programs that are njected nto the network are executed by the network elements to acheve hgher flexblty and to present new capabltes. Wth the help of AN programs can be njected n to the network and executed wth n the network tself wthout nvolvng the end systems. QoS routng s a term used for routng mechansms whch consder QoS. It suffers from the statc nature of networkng today. QoS routng s bound to the use of common metrcs and procedures whch usually rely on dstrbuted network performance data (ncreasng network traffc) and sophstcated algorthms (ncreasng the processor load on routers) but usually yeld consderable mprovements only for certan classes of applcatons. In [16], the authors used randomness at the lnk level to acheve balance between the safety rate and delay of the routng path. A) QOS SUPPORT IN ACTIVE NETWORKS Possble utlzatons of AN to support QoS roughly fall nto the followng categores [15]: 1. Mechansms whch transfer applcaton layer functonalty nto the network: 2. Mechansms whch are usually assocated wth layers 3 or 4: AQR mechansm falls n ths category. 3. Mechansms whch rely on non-actve QoS provsonng mechansms: Here, AN are merely used to add greater flexblty to the specfcaton of a QoS request. B) AQR OPERATION AQR s an on demand based QoS routng algorthm. The AQR algorthm can be descrbed as follows as n [15]. 1. The AQR sender calculates all non-cyclc paths to the destnaton from the lnk state routng table. 2. A probng packet carryng the QoS requrements, code for QoS calculaton, the sender and recever s addresses and a lst of vsted nodes s sent to each frst hop of these paths. 3. Upon recevng an AQR probng packet, an AQR complant transt node executes the AA code (contaned n the packet or cached), whch checks f the mnmum QoS requrements found n the packet can be met (f a threshold say a maxmum delay s exceeded, the packet s dropped), compares and updates the QoS data, adds tself to the lst of already vsted nodes, Executes the code of the AQR sender, startng at step 2 except that no probng packets are sent to the source or to any other already vsted node (packets are multcast n the proper drecton at each AQR-complant transt node). 4. Only packets whch conform to the mnmum QoS requrements reach the AQR recever, where a lst of vald paths s generated. After a predefned perod, the best path s chosen and communcated to the sender. If there s more than one best path, the traffc s splt among the best paths. C) DESIGN CONSIDERATIONS The resources used are network bandwdth and CPU cycles to load the network. The system assumes overlay mode of deployng actve code n network. The securty ssues are taken care of by the ANTS system tself For AQR, these parameters are delay and avalable bandwdth. For each of these parameters, a channel s gven the propertes of the underlyng network.the overall flow s depcted as follows. ISSN: Issue 12, Volume 7, December 2008

3 There are three mportant modules n the system. They are Applcaton, Protocol and capsule modules. The applcaton module conssts of Router, Sender, Recever sub modules. The capsule module conssts of DataCapsule, Probecapsule and Replycapsule sub modules. 3 Implementaton Detals The proposed AQR algorthm s mplemented for the sample network topology shown below. In ANTS, the network topology s confgured. The topology used s shown below. The routng protocol s mplemented usng the ANTS toolkt. ANTS s an EE runnng over the node OS Janos. The protocol s mplemented as an actve applcaton that runs on each of the nodes of the network. In ANTS, there are three specal classes to create capsules, protocols and actve applcatons. The detaled nformaton about ANTS s provded n [8].A new protocol s developed by sub classng the vrtual class Protocol. Ths requres dentfyng all of the dfferent types of packet that wll enter the network by ther dfferent forwardng routnes. Each type of packet and ts forwardng routne s specfed by sub classng the vrtual class Capsule. A new applcaton s developed by sub classng the vrtual class Applcaton. An nstance of the class Node represents the local ants runtme. A new protocol and applcaton are used by creatng nstances of ther classes and attachng them to node. The applcaton s connected to the node n order to send and receve capsules from the network. The protocol s regstered wth the node n order for the network to be able to obtan ts code when t s needed. Ths model allows customzaton by the network users assumng that a network of actve nodes already exsts and s up and runnng. The actve nodes, however, wll often be part of the system under study, partcularly for expermentaton wth dfferent topologes, applcaton workloads, and node servces. For these purposes, ANTS provdes two facltes: Confguraton tools allow a network topology complete wth applcatons to be managed. Ths ncludes the calculaton of routes and the ntalzaton of local node confguratons. A node extenson archtecture allows dfferent nodes to support dfferent servce components, e.g., multcast, cachng, trans codng, etc., as approprate. Extensons are developed by sub classng the vrtual class Extenson. The Protocol class s extended to form the AQR Protocol class. There are three capsules Probe Capsule, Reply Capsule and AQR Data Capsule. These capsules form the protocol tself. A) Capsule Types A capsule s a combnaton of a packet and ts forwardng routne; the forwardng routne s executed at every actve node the capsule vsts whle n the network. New types of capsule, wth dfferent forwardng routnes, are developed by sub classng the vrtual class Capsule. The capsule starts wth the sequence d of the data capsule. Then the tmestamp of when the capsule s sent s stored. Then some flags and ndex values are stored. The path ndex s the ponter to the next node to reach. The path vald s a flag that s set true when the capsule carres a path to travel. Otherwse default shortest path s used to reach the destnaton. There s another flag, aqrflag whch s set to dfferentate between capsules sent usng AQR and capsules sent usng SPR. Fnally the path to travel s stored. The actve code of ths capsule s the forwardng routne to gude the capsule to the destnaton. It checks for the pathvald flag and f set uses the path n the capsule to travel. Otherwse shortest path s used to forward the capsule to the destnaton. For vald path, the next node s obtaned from the path stored usng the path ndex ponter. The data capsule s then forwarded to ths node. Once the nodes n the path stored get over, t ndcates that the capsule has reached the destnaton. The capsule s then delvered to the recever applcaton. B) Applcaton ISSN: Issue 12, Volume 7, December 2008

4 Applcatons are the enttes that make use of the network to send and receve capsules as well as run ndependent actvtes. New applcatons are developed by sub classng the vrtual class Applcaton. It provdes access to the node and ts servces. C) Other modules The data traffc s generated by a thread AQR Data Sender. It s run on the sender node. Ths data traffc s receved by another applcaton on the recever node, AQR Data Recever. There are also other utlty classes. 4 Confguraton Expermentng wth an actve network requres that a network topology and ANTS provdes some tools and nfrastructure conventons to automate ths process. Frst, entre network confguratons, node addresses, applcatons and all ntalzaton parameters are specfed text fles that are read by Confguraton Manager Class to start one of ts nodes locally. Ths ncludes creatng the node runtme, applcatons, and extensons, connectng them to each other, and startng ther operaton. A) Performance Analyss The algorthm s run under varous test scenaros and the test results are presented n ths secton. The QoS performance s analyzed for data traffc wth and wthout background traffc.tg s a packet Traffc Generator (TG) tool that can be used to characterze the performance of packetswtched network communcaton protocols. The TG program generates and receves one-way packet traffc streams transmtted from the UNIX user level process between traffc source and traffc snk nodes n a network. TG s used for generatng the background traffc. The TG servng as the traffc source always logs datagram transmt tmes. Ths mode of operaton may be useful for analyzng network blockng characterstcs or for loadng a network. The TG servng as a traffc snk logs all receved data grams. The behavor of the protocol s analyzed after the ntermedate routers are loaded to make the default shortest path congested. For the same topology the shortest path routng s tested. Two applcatons are run on the source and destnaton nodes. The actve code n the capsule s used to route the capsule through the shortest path. The delay changes and the routes taken are recorded and analyzed. B) Performance analyss wthout background traffc In ths test run, the data capsules of length 100 bytes are used to test the protocol. No background traffc s used to load the shortest path. Instead the routers along the shortest path are loaded to ncrease the delay along the shortest path. In ths scenaro the test s run and the results shown below. The delay values are relatve and are not exact wth respect to the sender n all the data presented. C) Performance analyss wth background traffc type 1 In ths test run, the data capsules of length 100 bytes are used to test the protocol. Also background traffc s ntroduced along the shortest path to ncrease the delay along the shortest path. The traffc s ntroduced usng the tool TG. The background traffc s udp. Packets of length 500 bytes at a rate of 100Mbps are used for the traffc. 5 Fast Attack Detecton usng Neural Networks Fndng a certan attack, n the ncomng seral data, s a searchng problem. Frst neural networks are traned to classfy attack from non attack examples and ths s done n tme doman. In attack detecton phase, each poston n the ncomng matrx s tested for presence or absence of an attack. At each poston n the nput one dmensonal matrx, each sub-matrx s multpled by a wndow of weghts, whch has the same sze as the sub-matrx. The outputs of neurons n the hdden layer are multpled by the weghts of the output layer. When the fnal output s hgh, ths means that the sub-matrx under test contans an attack and vce versa. Thus, we may conclude that ths searchng problem s a cross correlaton between the ncomng seral data and the weghts of neurons n the hdden layer. The convoluton theorem n mathematcal analyss says that a convoluton of f wth h s dentcal to the result of the followng steps: let F and H be ISSN: Issue 12, Volume 7, December 2008

5 the results of the Fourer Transformaton of f and h n the frequency doman. Multply F and H* n the frequency doman pont by pont and then transform ths product nto the spatal doman va the nverse Fourer Transform. As a result, these cross correlatons can be represented by a product n the frequency doman. Thus, by usng cross correlaton n the frequency doman, speed up n an order of magntude can be acheved durng the detecton process [1,2,3,4,5,7,8,9,14]. Assume that the sze of the attack code s 1xn. In attack detecton phase, a sub matrx I of sze 1xn (sldng wndow) s extracted from the tested matrx, whch has a sze of 1xN. Such sub matrx, whch may be an attack code, s fed to the neural network. Let W be the matrx of weghts between the nput sub-matrx and the hdden layer. Ths vector has a sze of 1xn and can be represented as 1xn matrx. The output of hdden neurons h() can be calculated as follows: n h = g + W (k)i(k) b (1) k = 1 where g s the actvaton functon and b() s the bas of each hdden neuron (). Equaton 1 represents the output of each hdden neuron for a partcular sub-matrx I. It can be obtaned to the whole nput matrx Z as follows: n/2 h (u) = g W (k) Z(u+ k) + b k = n/2 (2) Eq.2 represents a cross correlaton operaton. Gven any two functons f and d, ther cross correlaton can be obtaned by: d(x) f(x) = f(x+ n)d(n) (3) n= Hence, by evaluatng ths cross correlaton, a speed up rato can be obtaned comparable to conventonal neural networks. Also, the fnal output of the neural network can be evaluated as follows: q O(u) = g = Wo () h (u) + bo (6) 1 where q s the number of neurons n the hdden layer. O(u) s the output of the neural network when the sldng wndow located at the poston (u) n the nput matrx Z. W o s the weght matrx between hdden and output layer. The complexty of cross correlaton n the frequency doman can be analyzed as follows: 1- For a tested matrx of 1xN elements, the 1D- FFT requres a number equal to Nlog 2 N of complex computaton steps [13]. Also, the same number of complex computaton steps s requred for computng the 1D-FFT of the weght matrx at each neuron n the hdden layer. 2- At each neuron n the hdden layer, the nverse 1D-FFT s computed. Therefore, q backward and (1+q) forward transforms have to be computed. Therefore, for a gven matrx under test, the total number of operatons requred to compute the 1D- FFT s (2q+1)Nlog 2 N. 3- The number of computaton steps requred by FTDNNs s complex and must be converted nto a real verson. It s known that, the one dmensonal Fast Fourer Transform requres (N/2)log 2 N complex multplcatons and Nlog 2 N complex addtons [13]. Every complex multplcaton s realzed by sx real floatng pont operatons and every complex addton s mplemented by two real floatng pont operatons. Therefore, the total number of computaton steps requred to obtan the 1D-FFT of a 1xN matrx s: Therefore, Eq. 2 may be wrtten as follows [1]: h = g( W Z+ b ) (4) ρ=6((n/2)log 2 N) + 2(Nlog 2 N) (7) where h s the output of the hdden neuron () and whch may be smplfed to: h (u) s the actvty of the hdden unt () when the sldng wndow s located at poston (u) and (u) ρ=5nlog 2 N (8) [N-n+1]. 4- Both the nput and the weght matrces should Now, the above cross correlaton can be expressed be dot multpled n the frequency doman. Thus, a n terms of one dmensonal Fast Fourer number of complex computaton steps equal to qn Transform as follows [1]: should be consdered. Ths means 6qN real W Z F 1 operatons wll be added to the number of = ( F ( Z ) F* ( W )) (5) computaton steps requred by FTDNNs. ISSN: Issue 12, Volume 7, December 2008

6 5- In order to perform cross correlaton n the frequency doman, the weght matrx must be extended to have the same sze as the nput matrx. So, a number of zeros = (N-n) must be added to the weght matrx. Ths requres a total real number of computaton steps = q(n-n) for all neurons. Moreover, after computng the FFT for the weght matrx, the conjugate of ths matrx must be obtaned. As a result, a real number of computaton steps = qn should be added n order to obtan the conjugate of the weght matrx for all neurons. Also, a number of real computaton steps equal to N s requred to create butterfles complex numbers (e -jk(2πn/n) ), where 0<K<L. These (N/2) complex numbers are multpled by the elements of the nput matrx or by prevous complex numbers durng the computaton of FFT. To create a complex number requres two real floatng pont operatons. Thus, the total number of computaton steps requred for FTDNNs becomes: σ=(2q+1)(5nlog 2 N) +6qN+q(N-n)+qN+N (9) whch can be reformulated as: σ=(2q+1)(5nlog 2 N)+q(8N-n)+N (10) 6- Usng sldng wndow of sze 1xn for the same matrx of 1xN pxels, q(2n-1)(n-n+1) computaton steps are requred when usng CTDNNs for certan attack detecton or processng (n) nput data. The theoretcal speed up factor η can be evaluated as follows: q(2n-1)(n- n + 1) η = (11) (2q+ 1)(5Nlog N) + q(8n- n) N 2 + CTDNNs and FTDNNs are shown n Fgures 6 and 7 respectvely. Tme delay neural networks accept seral nput data wth fxed sze (n). Therefore, the number of nput neurons equals to (n). Instead of treatng (n) nputs, the proposed new approach s to collect all the ncomng data together n a long vector (for example 100xn). Then the nput data s tested by tme delay neural networks as a sngle pattern wth length L (L=100xn). Such a test s performed n the frequency doman as descrbed n secton II. The combned attack n the ncomng data may have real or complex values n a form of one or two dmensonal array. Complex-valued neural networks have many applcatons n felds dealng wth complex numbers such as telecommuncatons, speech recognton and mage processng wth the Fourer Transform [6,10]. Complex-valued neural networks mean that the nputs, weghts, thresholds and the actvaton functon have complex values. In ths secton, formulas for the speed up rato wth dfferent types of nputs (real /complex) wll be presented. Also, the speed up rato n case of a one and two dmensonal ncomng nput matrx wll be concluded. The operaton of FTDNNs depends on computng the Fast Fourer Transform for both the nput and weght matrces and obtanng the resultng two matrces. After performng dot multplcaton for the resultng two matrces n the frequency doman, the Inverse Fast Fourer Transform s determned for the fnal matrx. Here, there s an excellent advantage wth FTDNNs that should be mentoned. The Fast Fourer Transform s already dealng wth complex numbers, so there s no change n the number of computaton steps requred for FTDNNs. Therefore, the speed up rato n case of complex-valued tme delay neural networks can be evaluated as follows: 1) In case of real nputs A) For a one dmensonal nput matrx Multplcaton of (n) complex-valued weghts by (n) real nputs requres (2n) real operatons. Ths produces (n) real numbers and (n) magnary numbers. The addton of these numbers requres (2n-2) real operatons. The multplcaton and addton operatons are repeated (N-n+1) for all possble sub matrces n the ncomng nput matrx. In addton, all of these procedures are repeated at each neuron n the hdden layer. Therefore, the number of computaton steps requred by conventonal neural networks can be calculated as: θ=2q(2n-1)(n-n+1) (12) The speed up rato n ths case can be computed as follows: 2q(2n-1)(N- n + 1) η = (13) (2q+ 1)(5Nlog N) + q(8n- n) N 2 + Practcal speed up rato for searchng short successve (n) data n a long nput vector (L) usng complex-valued tme delay neural networks ISSN: Issue 12, Volume 7, December 2008

7 s shown n Fgure 8. Ths has beed performed by usng a 700 MHz processor and MATLAB. B) For a two dmensonal nput matrx Multplcaton of (n 2 ) complex-valued weghts by (n 2 ) real nputs requres (2n 2 ) real operatons. Ths produces (n 2 ) real numbers and (n 2 ) magnary numbers. The addton of these numbers requres (2n 2-2) real operatons. The multplcaton and addton operatons are repeated (N-n+1) 2 for all possble sub matrces n the ncomng nput matrx. In addton, all of these procedures are repeated at each neuron n the hdden layer. Therefore, the number of computaton steps requred by conventonal neural networks can be calculated as: θ=2q(2n 2-1)(N-n+1) 2 (14) The speed up rato n ths case can be computed as follows: 2 2q(2n -1)(N- n + 1) η = (15) (2q+ 1)(5N log N ) + q(8n - n ) + N 2 Practcal speed up rato for detectng (nxn) real valued submatrx n a large real valued matrx (NxN) usng complex-valued tme delay neural networks s shown n Fg. 9. Ths has beed performed by usng a 700 MHz processor and MATLAB. 2) In case of complex nputs A) For a one dmensonal nput matrx Multplcaton of (n) complex-valued weghts by (n) complex nputs requres (6n) real operatons. Ths produces (n) real numbers and (n) magnary numbers. The addton of these numbers requres (2n-2) real operatons. Therefore, the number of computaton steps requred by conventonal neural networks can be calculated as: θ=2q(4n-1)(n-n+1) (16) The speed up rato n ths case can be computed as follows: 2q(4n-1)(N- n + 1) η = (17) (2q+ 1)(5Nlog N) + q(8n- n) N Practcal speed up rato for searchng short complex successve (n) data n a long complexvalued nput vector (L) usng complex-valued tme delay neural networks s shown n Fg. 10. Ths has beed performed by usng a 700 MHz processor and MATLAB. B) For a two dmensonal nput matrx Multplcaton of (n 2 ) complex-valued weghts by (n 2 ) real nputs requres (6n 2 ) real operatons. Ths produces (n 2 ) real numbers and (n 2 ) magnary numbers. The addton of these numbers requres (2n 2-2) real operatons. Therefore, the number of computaton steps requred by conventonal neural networks can be calculated as: θ=2q(4n 2-1)(N-n+1) 2 (18) The speed up rato n ths case can be computed as follows: 2 2q(4n -1)(N- n + 1) η = (19) (2q+ 1)(5N log N ) + q(8n - n ) + N 2 Practcal speed up rato for detectng (nxn) complex-valued submatrx n a large complexvalued matrx (NxN) usng complex-valued neural networks s shown n Fg. 11. Ths has beed performed by usng a 700 MHz processor and MATLAB. An nterestng pont s that the memory capacty s reduced when usng FTDNN. Ths s because the number of varables s reduced compared wth CTDNN. The neural algorthm presented here can be nserted very easly n any Ant-Attack gateway software. 6. Concluson The AQR protocol s mplemented usng ANTS and the performance of the AQR algorthm s analyzed. It s nferred that wth background traffc, the AQR fnds alternatve paths quckly. It reduces the delay and subsequently reduces the jtter nvolved. The varant of AQR usng the product of avalable bt rate and delay for fndng the best path s useful n reducng the jtter where the overall traffc n the network s heavy. It helps to mantan the jtter n networks wth more bursty traffc. It s also nferred that the performance of AQR s better than that of SPR n both cases. Performance s analyzed for varous traffc classes. The probe capsules are sent along each path from the source to the destnaton to fnd the best path. By tunng the probng frequency to an optmal value, the traffc caused by the probe 2 ISSN: Issue 12, Volume 7, December 2008

8 capsules can be reduced. Comparng wth the data traffc, probe capsules are small n number. The topology should be known by all nodes to fnd the best path. In ths paper dynamc topology s consdered and floodng s used to fnd the best path. Ths fnds applcaton n fndng effectve QoS routng n ad-hoc networks as well as defendng DDoS attacks by dentfyng the attack traffc path usng QoS regulatons. The floodng overhead nvolved s unavodable and some pay off measures need to be dentfed. It s also proposed to choose the best path based on error rate so that the loss of probe capsules can also be taken nto consderaton. A new approach for fast attack detecton has been presented. Such strategy has been realzed by usng a new desgn for tme delay neural networks. Theoretcal computatons have shown that FTDNNs requre fewer computaton steps than conventonal ones. Ths has been acheved by applyng cross correlaton n the frequency doman between the ncomng seral data and the nput weghts of tme delay neural networks. Smulaton results have confrmed ths proof by usng MATLAB. Furthermore, the memory complexty has been reduced when usng the fast neural algorthm. In addton, ths algorthm can be combned n any Ant-attack gateway software. References: [1] H. M. El-Bakry, and Q. Zhao, A Modfed Cross Correlaton n the Frequency Doman for Fast Pattern Detecton Usng Neural Networks, Internatonal Journal of Sgnal Processng, vol.1, no.3, pp , [2] H. M. El-Bakry, and Q. Zhao, Fast Object/Face Detecton Usng Neural Networks and Fast Fourer Transform, Internatonal Journal of Sgnal Processng, vol.1, no.3, pp , [3] H. M. El-Bakry, and Q. Zhao, Fast Pattern Detecton Usng Normalzed Neural Networks and Cross Correlaton n the Frequency Doman, EURASIP Journal on Appled Sgnal Processng, Specal Issue on Advances n Intellgent Vson Systems: Methods and Applcatons Part I, vol. 2005, no. 13, 1 August 2005, pp [4] H. M. El-Bakry, and Q. Zhao, A Fast Neural Algorthm for Seral Code Detecton n a Stream of Sequental Data, Internatonal Journal of Informaton Technology, vol.2, no.1, pp , [5] H. M. El-Bakry, and H. Stoyan, FNNs for Code Detecton n Sequental Data Usng Neural Networks for Communcaton Applcatons, Proc. of the Frst Internatonal Conference on Cybernetcs and Informaton Technologes, Systems and Applcatons: CITSA 2004, July, Orlando, Florda, USA, Vol. IV, pp [6] A. Hrose, Complex-Valued Neural Networks Theores and Applcatons, Seres on nnovatve Intellegence, vol.5. Nov [7] H. M. El-Bakry, Face detecton usng fast neural networks and mage decomposton, Neurocomputng Journal, vol. 48, 2002, pp [8] H. M. El-Bakry, Human Irs Detecton Usng Fast Cooperatve Modular Neural Nets and Image Decomposton, Machne Graphcs & Vson Journal (MG&V), vol. 11, no. 4, 2002, pp [9] H. M. El-Bakry, Automatc Human Face Recognton Usng Modular Neural Networks, Machne Graphcs & Vson Journal (MG&V), vol. 10, no. 1, 2001, pp [10] S. Jankowsk, A. Lozowsk, M. Zurada, Complex-valued Multstate Neural Assocatve Memory, IEEE Trans. on Neural Networks, vol.7, 1996, pp [11] H. M. El-Bakry, and Q. Zhao, Fast Pattern Detecton Usng Neural Networks Realzed n Frequency Doman, Proc. of the Internatonal Conference on Pattern Recognton and Computer Vson, The Second World Enformatka Congress WEC'05, Istanbul, Turkey, Feb., 2005, pp [12] H. M. El-Bakry, and Q. Zhao, Sub-Image Detecton Usng Fast Neural Processors and Image Decomposton, Proc. of the Internatonal Conference on Pattern Recognton and Computer Vson, The Second World Enformatka Congress WEC'05, Istanbul, Turkey, Feb., 2005, pp [13] J. W. Cooley, and J. W. Tukey, "An algorthm for the machne calculaton of complex Fourer seres," Math. Comput. 19, (1965). ISSN: Issue 12, Volume 7, December 2008

9 [14] R. Klette, and Zamperon, "Handbook of mage processng operators, " John Wley & Sonsltd, [15] Mchael Welzl, Alfred Chal, Max Mühlhäuser, An Approach to Flexble QoS Routng wth Actve Networks, Proceedngs of the Fourth Annual Internatonal Workshop on Actve Mddleware Servces (AMS 02), [16] Wang Janxn, Wang Wepng, Chen Jan'er, Chen Songqao. A randomzed QoS routng algorthm on networks wth naccurate lnk-state nformaton, Proc. the 16th World Computer Conference, Internatonal Conference of Communcaton Technology, Bejng, Aug., 2000, pp [17] Stavros Vronts, Irene Sygkouna, Mara Chantzara and Eystathos Sykas, Enablng Dstrbuted QoS Management utlzng Actve Network technology, Natonal Techncal Unversty of Athens. [18] Davd J. Wetherall, John V. Guttag and Davd L. Tennenhouse, ANTS: A Toolkt for Buldng and Dynamcally Deployng Networks Protocols, Software Devces and Systems Group, Laboratory for Computer Scence, Massachusetts Insttute of Technology, Aprl [19] Juraj Sucík, Ing. Frantšek Jakab, Measurement and Evaluaton of Qualty of Servce Parameters n Computer Networks, Department of Computers and Informatcs, Techncal Unversty of Košce, Letná 9, Košce, Slovak Republc. [20] Roche A. Guérn, Arel Orda, QoS routng n networks wth naccurate nformaton: Theory and algorthms, IEEE/ACM Transactons on Networkng (TON), v.7 n.3, p , June 1999 [21] Dean H. Lorenz, Arel Orda, QoS routng n networks wth uncertan parameters, IEEE/ACM Transactons on Networkng (TON), v.6 n.6, p , Dec [22] Rajagopalan B, Saadck H, A Framework for QoS-based Routng n the Internet, RFC 2386, IETF, Aug., [23] M. Resslen, K. W. Ross, and S. Rajagopal, Guaranteeng statstcal QoS to regulated traffc: The sngle node case, Proceedngs of IEEE INFOCOM 99, pages , New York, March [24] M. Resslen, K. W. Ross, and S. Rajagopal. Guaranteeng statstcal QoS to regulated traffc: The multple node case, Proceedngs of 37th IEEE Conference on Decson and Control (CDC), pages , Tampa, December [25] Davd Wetherall, Ulana Legedza, and John Guttag, Introducng New Internet Servces: Why and How, Software Devces and Systems Group, Laboratory for Computer Scence, Massachusetts Insttute of Technology, July [26] P. Hurley, J.-Y. Le Boudec, P. Thran, and M. Kara.ABE, Provdng a Low-Delay Servce wthn Best Effort, IEEE Network Magazne, v 15, no 3,May/June Table 1. Performance data wthout background traffc. SPR AQR Max. delay (ms) Mn. delay (ms) Avg. delay (ms) Max. jtter (ms) Table 2. Performance data wth background traffc type 1 SPR AQR Max. delay (ms) Mn. delay (ms) Avg. delay (ms) Max. jtter (ms) ISSN: Issue 12, Volume 7, December 2008

10 Actve QoS routng QoS mprovement Behavor n splt Traffc Comparson wth shortest path routng Behavor under Tolerance parameter Fg. 1. Data flow dagram. Fg. 2. Sample network topology. Fg. 3. Structure of AQR protocol. ISSN: Issue 12, Volume 7, December 2008

11 Fg. 4 Delay response wthout background traffc. Fg.5. Delay response wth background traffc type 1. ISSN: Issue 12, Volume 7, December 2008

12 I 1 I 2 Output Layer Output I n-1 Hdden Layer I n Input Layer Dot multplcaton n tme doman between the (n) nput data and weghts of the hdden layer. Seral nput data 1:N n groups of (n) elements shfted by a step of one element each tme. I N Fg.6. Classcal tme delay neural networks. I 1 I 2 Output Layer Output I N-1 Hdden Layer I N Fg.7. Fast tme delay neural networks. Cross correlaton n the frequency doman between the total (N) nput data and the weghts of the hdden layer. ISSN: Issue 12, Volume 7, December 2008

13 Speed up Rato Practcal Speed up rato (n=400) Practcal Speed up rato (n=625) Practcal Speed up rato (n=900) E+05 5E+05 1E+06 2E+06 3E+06 4E+06 Length of one dmensonal nput matrx Fg. 8. Practcal speed up rato for tme delay neural networks n case of one dmensonal real-valued nput matrx and complex-valued weghts. Speed up Rato Speed up Rato (n=20) Speed up Rato (n=25) Speed up Rato (n=30) Sze of two dmensonal nput matrx Fg. 9. Practcal speed up rato when usng FTDNNs n case of two dmensonal real-valued nput matrx and complex-valued weghts. ISSN: Issue 12, Volume 7, December 2008

14 Speed up Rato Practcal Speed up rato (n=400) Practcal Speed up rato (n=625) Practcal Speed up rato (n=900) E+05 5E+05 1E+06 2E+06 3E+06 4E+06 Length of one dmensonal nput matrx Fg. 10. Practcal speed up rato when usng FTDNNs n case of one dmensonal complex-valued nput matrx and complexvalued weghts Speed up Rato Speed up Rato (n=20) Speed up Rato (n=25) Speed up Rato (n=30) Sze of two dmensonal nput matrx Fg. 11. Practcal speed up rato when usng FTDNNs n case of two dmensonal complex-valued nput matrx and complexvalued weghts. ISSN: Issue 12, Volume 7, December 2008

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion 212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

Network Services Definition and Deployment in a Differentiated Services Architecture

Network Services Definition and Deployment in a Differentiated Services Architecture etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Hosting Virtual Machines on Distributed Datacenters

Hosting Virtual Machines on Distributed Datacenters Hostng Vrtual Machnes on Dstrbuted Datacenters Chuan Pham Scence and Engneerng, KyungHee Unversty, Korea pchuan@khu.ac.kr Jae Hyeok Son Scence and Engneerng, KyungHee Unversty, Korea sonaehyeok@khu.ac.kr

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Case Study: Load Balancing

Case Study: Load Balancing Case Study: Load Balancng Thursday, 01 June 2006 Bertol Marco A.A. 2005/2006 Dmensonamento degl mpant Informatc LoadBal - 1 Introducton Optmze the utlzaton of resources to reduce the user response tme

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information